Domain 1: Security and Risk Management Flashcards
What is the CIA Triad?
Confidentiality, Integrity and Availability
What is the principle of ‘confidentiality’?
It is about protecting secrecy of data, objects, or resources by preventing unauthorised access to data. Prevent unauthorised disclosure, need to know, and least privilege, assurance that information is not disclosed to unauthorised programs, users, processes, encryption, logical and physical access control.
What is the principle of ‘integrity’?
Protecting the reliability and correctness of data. Examples include access controls, IDS/IPS, and hashing.
What is the principle of ‘availability’?
Providing authorised subjects timely and uninterrupted access to objects. This means access to data is reliable, timely, accessible, fault tolerant, and has recovery procedures in place. Examples include, monitoring network traffic.
What is an ‘object’?
Passive element, such as files, computers, network connections, and applications
What is a ‘subject’?
Active element in a security relationship, such as users, programs and computers.
What is defense in depth?
Use of multiple controls in a series to protect an asset
What is abstraction?
Where details of something is hidden. Security controls can be applied to the entire group (thus hiding the details)
What is ‘IAAA’?
Identification, Authentication, Authorisation, and Auditing
What is ‘Authentication’?
Proving one’s identity. Process of verifying or testing that the claimed identity is valid. Examples include providing a correct password, or other correct information.
What is ‘Authorisation’?
About defining the permissions (e.g. grant or deny) of a resource and object access for a specific identity. It involves evaluating an access control matrix that compares the subject, the object, and the intended activity.
What is ‘Auditing’?
Process of recording log files to check for compliance and violations in order to hold subjects accountable for their actions. Ensures that a subject’s actions are non-repudiation.
What is ‘layering’?
Use of multiple controls in a series. Also known as Defense in Depth. Serial configurations (controls in a row) are very narrow but very deep, alternatively parallel configurations are very broad, but lack depth.
What is ‘data hiding’?
Preventing data from being discovered or accessed by a subject positioning the data in a logical storage compartment that is not accessible or seen by the subject. Such as polyinstantiaton.
What is the weakest element in any security solution?
Humans
What role does job descriptions play when hiring new staff?
Ensure job descriptions consider separation of duties to separate key functions to limit ability for one employee to circumvent key security controls. Further, ensure a classification for the job.
What is ‘job rotation’?
Rotating employees among multiple job positions. This is the best way to investigate an employee’s daily business activity to uncover any potential fraud that may be taking place.
Strategic Plan
Long term plan defining organisation’s security purpose. Aligns the plan with the organisations goals, mission, objectives. This is a 5 year plan with annual reviews
Tactical Plan
Mid term plan developed to provide more details on accomplishing the goals set forth in the strategic plan or can be crafted ad hoc based upon unpredictable events. This lasts a year
Operational Plan
Short term (for a month or quarter) highly detailed plan. Purpose to retain compliance with tactical plans. The plans may include: resource allotments, budgetary requirements.
Data Classification Process
Identify the custodian, specify evaluation criteria, document any exceptions, select security controls for each level, specify the procedures for declassifying, and create enterprise wide awareness program
Levels of Government/military classification
Top Secret, Secret, Confidential, Sensitive but Unclassified, Unclassified
Levels of Corporate classifications
Confidential, Private, Sensitive, Public
Due care
Using responsible care to protect the interests of an organisation. Company must do all that it could have reasonably done to try and prevent a security breach /compromise/disaster, and take the necessary steps required as countermeasures/controls (safeguards).